A high number of sites got hit by the latest OpenX security hole. Although OpenX released a patch, it did not clean out what the hackers added.
After your updated installation make sure you dont have any "PREPEND" or "APPEND" code added to your banner code. This can be found under the 'Advanced' tab within Banner Properties.

If you are sure you have never used a Prepend or Append code in your banners you can clear out all of the bad code with these 2 SQL queries:

* Use phpMyAdmin only if you know what you are doing. *

UPDATE ox_banners SET append = null, prepend = null
WHERE append LIKE '%ifra%' OR prepend LIKE '%ifra%';

UPDATE ox_zones SET append = null, prepend = null
WHERE append LIKE '%ifra%' OR prepend LIKE '%ifra%';

Next make sure you dont have an added user: temp2

Default Manager > Inventory > User Access

If you see the user TEMP2, delete it. If you dont the hackers can get right back into your installation to add more bad code.

Good luck.